Privacy is not
a feature. It's
the foundation.
Incognito is a Layer 1 blockchain built on CryptoNote protocol with WhirlpoolX proof-of-work. Every transaction is private by default, untraceable, and unlinkable.
Coin Specifications
A fair-launch Layer 1 cryptocurrency built for privacy from the ground up. No pre-mine, no ICO, no VCs.
Total Supply
888,888,888 INC hard-capped. No inflation, no hidden minting. The supply is finite and verifiable.
LiveBlock Reward
720 INC distributed per day across miners. Consistent, predictable emission schedule for fair distribution.
LiveMining Pools
Community mining pools are currently under development. WhirlpoolX PoW ensures ASIC-resistant mining.
SoonExchanges
Exchange listings are being pursued. Trade INC on centralized and decentralized platforms soon.
SoonSocial
Join the growing Incognito community. Official social channels and communication platforms launching soon.
SoonBlock Explorer
Live on-chain data viewer at scan.incognitolayer.pro. Verify blocks, transactions, and network stats.
LiveWhirlpoolX Algorithm
A modified Whirlpool hash function using Miyaguchi-Preneel construction with an extra XOR pass for ASIC resistance.
origin: "Barreto & Rijmen, 2000"
base: "Whirlpool Hash Function"
block_size: 512 bits
digest_size: 512 bits
structure: "Miyaguchi-Preneel"
cipher: "W (AES-like)"
rounds: 10
// Modifications
mod: "Extra XOR operation"
goal: "Break ASIC compatibility"
derived_from: "Vanillacoin / Vcash"
// Round Transformations
steps: [
"SubBytes",
"ShiftColumns",
"MixRows",
"AddRoundKey"
]
◆ AES-Like Structure
Uses SubBytes, ShiftColumns, MixRows, and AddRoundKey transformations across 10 rounds, providing strong diffusion and confusion.
◆ Miyaguchi-Preneel
A provably secure compression function construction that applies a dedicated block cipher (W) to achieve collision resistance.
◆ Extra XOR Scramble
The WhirlpoolX modification adds an extra XOR operation to the output, breaking compatibility with existing Whirlpool ASIC implementations.
◆ ASIC Resistance
Designed to keep mining accessible to GPU and CPU miners by resisting specialized hardware optimization.
CryptoNote Protocol
Four cryptographic pillars ensure every transaction on Incognito is private, untraceable, and unlinkable by default.
Ring Signatures
When you send funds, your signature is mixed with a group of possible signers (decoys). This makes it computationally infeasible to determine which input actually belongs to you.
Stealth Addresses
Each transaction uses a one-time public key derived from the recipient's address. Even if you receive multiple payments, they cannot be linked together on the blockchain.
Key Images
Uses cryptographic markers derived from your private key. Each spend produces a unique key image that can only appear once in the blockchain, preventing double spends while preserving anonymity.
Adaptive Parameters
Block size dynamically adjusts based on demand instead of being fixed. Mining difficulty adjusts automatically to maintain consistent block times across the network.
Resources
Explore the project, verify on-chain data, and get involved.